Skip to main content

OAuth Clients

OAuth clients are applications that can authenticate with OctoMesh. Every application that accesses OctoMesh APIs — whether a web application, a background service, or a CLI tool — must be registered as a client.

Accessing OAuth Clients

Navigate to Identity > Clients to access the client management interface.

The list shows all registered clients:

ColumnDescription
Client IDUnique identifier for the client
NameDisplay name of the client
EnabledWhether the client is active
URIThe client's base URL

Toolbar Actions

ButtonDescription
New ClientRegister a new client application
SearchFilter clients by ID or name
Export to ExcelExport the client list to an Excel file
Export to PDFExport the client list to a PDF file
Refresh DataReload the client list

Row and Context Actions

ActionDescription
EditOpen the client in the edit form
DeleteDelete the client (context menu, with confirmation)

Creating a Client

Click New Client to open the client creation form.

Basic Information

FieldRequiredDescription
Client IDYesUnique identifier (cannot be changed after creation)
Client NameYesDisplay name for the client
Client URINoBase URL of the client application
Client SecretNoSecret for confidential clients (device code, client credentials)

Options

OptionDescription
Require Client SecretWhether the client must authenticate with a secret
EnabledWhether the client can be used for authentication
Offline Access (Refresh Tokens)Allow the client to request refresh tokens

Allowed Grant Types

Select which OAuth 2.0 grant types the client can use:

Grant TypeUse Case
authorization_codeWeb applications with browser-based login
client_credentialsService-to-service authentication (no user context)
urn:ietf:params:oauth:grant-type:device_codeDevices and CLI tools without a browser
refresh_tokenRefresh expired access tokens

Redirect URIs

Configure where the Identity Service is allowed to redirect after authentication. Click the Add button to add entries.

Each redirect URI must be a full URL (e.g., https://myapp.example.com/callback/).

Post Logout Redirect URIs

Configure where the Identity Service redirects after logout. Click the Add button to add entries.

Allowed CORS Origins

Configure which origins are allowed for cross-origin requests to the Identity Service. Click the Add button to add entries.

note

CORS origins must not have a trailing slash (e.g., https://myapp.example.com).

Allowed Scopes

Configure which API scopes the client can request. Click the Add button to add entries. Common scopes:

ScopeDescription
openidRequired for OIDC — provides user identifier
profileUser profile information (name)
emailUser email address
roleUser roles
octo_apiFull access to all OctoMesh APIs
octo_api.read_onlyRead-only access to all OctoMesh APIs

Click Save to register the client or Cancel to discard.

Editing a Client

Click Edit on a client row to open the edit form. The Client ID is read-only. All other fields can be modified.

Updating the Client Secret

In edit mode, the existing secret is not displayed (it is stored encrypted). To set a new secret:

  1. Click Set New Secret
  2. Enter the new secret
  3. Click Save

Deleting a Client

Right-click a client and select Delete. Confirm the deletion in the dialog.

danger

Deleting a client immediately prevents all applications using that client ID from authenticating. Make sure the client is no longer in use before deleting it.

Default Clients

The following clients are created automatically during system setup:

Client IDTypePurpose
octo-cliDevice CodeOctoMesh command-line tool
octo-idenityServices-swaggerAuthorization Code (PKCE)Identity API Swagger UI
octo-data-refinery-studioAuthorization Code (PKCE)Data Refinery Studio